<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP-TLS issue on ISE &amp; Windows 10 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439153#M529221</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Speeds have nothing to do with ISE. ISE just authenticates. Its not an encrypted tunnel unless using MACSEC (which requests anyconnect supplicant).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Jun 2017 15:01:44 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2017-06-07T15:01:44Z</dc:date>
    <item>
      <title>EAP-TLS issue on ISE &amp; Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439150#M529213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello there,&lt;BR /&gt;I have a Cisco ISE 1.3 server running dot1x on wired and wireless.&lt;BR /&gt;Windows 10 is now being deployed and I have run into some issues regarding authenticating.&lt;/P&gt;&lt;P&gt;Windows 10 clients seems to take a while to get authenticated, and when it does, the client speed is very limited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication process looks the following&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11017 : RADIUS created a new session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15049 : Evaluating Policy Group&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15008 : Evaluating Service Selection Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15048 : Queried PIP - Radius.Service-Type&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15048 : Queried PIP - Radius.NAS-Port-Type&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15004 : Matched rule - Dot1X&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11507 : Extracted EAP-Response/Identity&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12500 : Prepared EAP-Request proposing EAP-TLS with challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12502 : Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12800 : Extracted first TLS record; TLS handshake started&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12805 : Extracted TLS ClientHello message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12806 : Prepared TLS ServerHello message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12807 : Prepared TLS Certificate message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12809 : Prepared TLS CertificateRequest message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12571 : ISE will continue to CRL verification if it is configured for specific CA - xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12571 : ISE will continue to CRL verification if it is configured for specific CA - xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12571 : ISE will continue to CRL verification if it is configured for specific CA - certificate for xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12811 : Extracted TLS Certificate message containing client certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12812 : Extracted TLS ClientKeyExchange message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12813 : Extracted TLS CertificateVerify message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12804 : Extracted TLS Finished message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12801 : Prepared TLS ChangeCipherSpec message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12802 : Prepared TLS Finished message&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12816 : TLS handshake succeeded&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12509 : EAP-TLS full handshake finished successfully&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12505 : Prepared EAP-Request with another EAP-TLS challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11006 : Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11001 : Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11018 : RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12504 : Extracted EAP-Response containing EAP-TLS challenge-response&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15041 : Evaluating Identity Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15006 : Matched Default Rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22072 : Selected identity source sequence - _cert_seq&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22070 : Identity name is taken from certificate attribute&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22037 : Authentication Passed&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12506 : EAP-TLS authentication succeeded&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15036 : Evaluating Authorization Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15048 : Queried PIP - EndPoints.LogicalProfile&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15048 : Queried PIP - Radius.Service-Type&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15048 : Queried PIP - Radius.NAS-Port-Type&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15048 : Queried PIP - Radius.Called-Station-ID&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15004 : Matched rule -&amp;nbsp; Wireless 802.1x&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15016 : Selected Authorization Profile - VLAN_xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11503 : Prepared EAP-Success&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11002 : Returned RADIUS Access-Accept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know windows 10 is not officially supported until Cisco ISE 1.4 but maybe someone have seen this before.&lt;BR /&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/M&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jun 2017 08:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439150#M529213</guid>
      <dc:creator>bluedogspider</dc:creator>
      <dc:date>2017-06-07T08:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS issue on ISE &amp; Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439151#M529215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would recommend working through the TAC, it looks like something is causing the device to negotiate over and over.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure 1.3 is on latest patch and windows 10 has all relevant supplicant fixes installed (windows update critical important)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE 1.3 BTW is EOL&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/bulletin-c25-737392.html&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also mentioned client speed is slow. I assume that means network transfers? Would look into network as ISE simply authenticates the device and has nothing to do with network speed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jun 2017 14:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439151#M529215</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-06-07T14:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS issue on ISE &amp; Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439152#M529217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. &lt;BR /&gt;I will check patch levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yea, I realise it is quite an old release. Hopefully the customer agrees to upgrading it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yea the transfer speeds are slow, but when using Windows 7, everything is smooth and fast.&lt;BR /&gt;I have attempted forcing windows 10 to use EAP-TLS 1.0, but to no avail. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jun 2017 14:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439152#M529217</guid>
      <dc:creator>bluedogspider</dc:creator>
      <dc:date>2017-06-07T14:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS issue on ISE &amp; Windows 10</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439153#M529221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Speeds have nothing to do with ISE. ISE just authenticates. Its not an encrypted tunnel unless using MACSEC (which requests anyconnect supplicant).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jun 2017 15:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue-on-ise-windows-10/m-p/3439153#M529221</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-06-07T15:01:44Z</dc:date>
    </item>
  </channel>
</rss>

